First published: Fri Sep 26 2008(Updated: )
The Hash-based Message Authentication Code (HMAC) provider in Java on Apple Mac OS X 10.4.11, 10.5.4, and 10.5.5 uses an uninitialized variable, which allows remote attackers to execute arbitrary code via a crafted applet, related to an "error checking issue."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.11 | |
macOS Yosemite | =10.5.4 | |
macOS Yosemite | =10.5.5 | |
Apple Mac OS X Server | =10.4.11 | |
Apple Mac OS X Server | =10.5.4 | |
Apple Mac OS X Server | =10.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3637 is considered to have a medium severity level as it allows remote code execution through crafted applets.
To fix CVE-2008-3637, update your Apple Mac OS X to versions that address the vulnerability, specifically versions 10.5.6 or later.
CVE-2008-3637 affects Mac OS X versions 10.4.11, 10.5.4, and 10.5.5.
Yes, CVE-2008-3637 can be exploited remotely by attackers through malware crafted to target the vulnerability.
Yes, Apple released a security update that includes a patch for CVE-2008-3637.